By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: Microsoft Outlook and Azure were inaccessible due to DDoS attacks
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > Microsoft Outlook and Azure were inaccessible due to DDoS attacks
News

Microsoft Outlook and Azure were inaccessible due to DDoS attacks

Last updated: 2023/06/19 at 1:04 PM
Security Parrot Editorial Team Published June 19, 2023
Share
SHARE

Microsoft Analyzes Cyberattacks That Disrupted Services

Microsoft Security Response Center (MSRC) has released a detailed analysis of the cyberattacks that crippled online services earlier this month. The response describes a series of Layer 7 distributed denial-of-service (DDoS) attacks launched by a threat actor Microsoft calls Storm-1359.

What Happened?

According to Microsoft, the Layer 7 DDoS attacks disrupted the company’s most popular services, including Azure, Outlook and OneDrive. A “Layer 7” attack is a form of DDoS that targets the application layer of the internet protocol suite. The attack vector uses a large number of requests to overwhelm the application layer and cause service interruptions or outages.
Microsoft has determined that Storm-1359 has access to a large collection of botnets and tools. This would allow the threat actor to launch DDoS attacks from multiple cloud services and open proxy infrastructures. Storm-1359 appears to be targeting disruption and publicity, MSRC said.

Preventing Future Disruptions

The DDoS attack first targeted the Outlook.com web portal on June 7. Next, the attackers moved to OneDrive on June 8, followed by the Microsoft Azure Portal on June 9. MSRC says Storm-1359’s attack methods include HTTP(S) flood attacks, cache bypass and Slowloris, each designed to flood a web service’s available connections, preventing it from serving new requests.
Following the attacks, Microsoft launched a detailed investigation and took steps to mitigate or prevent future attacks.
“This recent DDoS activity has targeted layer 7 rather than layer 3 or 4,” explains MSRC. Microsoft says it has “strengthened” layer 7 protections, including tuning Azure Web Application Firewall (WAF) to better protect customers against the impact of similar DDoS attacks. While these tools and techniques are highly effective in mitigating the majority of disruptions, Microsoft consistently assesses the performance of its hardening capabilities and incorporates the lessons learned in refining and improving their effectiveness.
While the attackers disrupted services, they left customer data untouched, Microsoft said. “We have seen no evidence that customer data has been accessed or compromised,” the response read.

Microsoft Analyzes Cyberattacks That Disrupted Services

Microsoft Security Response Center (MSRC) has released a detailed analysis of the cyberattacks that crippled online services earlier this month. The response describes a series of Layer 7 distributed denial-of-service (DDoS) attacks launched by a threat actor Microsoft calls Storm-1359.

What Happened?

According to Microsoft, the Layer 7 DDoS attacks disrupted the company’s most popular services, including Azure, Outlook and OneDrive. A “Layer 7” attack is a form of DDoS that targets the application layer of the internet protocol suite. The attack vector uses a large number of requests to overwhelm the application layer and cause service interruptions or outages.
Microsoft has determined that Storm-1359 has access to a large collection of botnets and tools. This would allow the threat actor to launch DDoS attacks from multiple cloud services and open proxy infrastructures. Storm-1359 appears to be targeting disruption and publicity, MSRC said.
The DDoS attack first targeted the Outlook.com web portal on June 7. Next, the attackers moved to OneDrive on June 8, followed by the Microsoft Azure Portal on June 9. MSRC says Storm-1359’s attack methods include HTTP(S) flood attacks, cache bypass and Slowloris, each designed to flood a web service’s available connections, preventing it from serving new requests.

Preventing Future Disruptions

Microsoft launched a detailed investigation and took steps to mitigate or prevent future attacks.
“This recent DDoS activity has targeted layer 7 rather than layer 3 or 4,” explains MSRC. Microsoft says it has “strengthened” layer 7 protections, including tuning Azure Web Application Firewall (WAF) to better protect customers against the impact of similar DDoS attacks. While these tools and techniques are highly effective in mitigating the majority of disruptions, Microsoft consistently assesses the performance of its hardening capabilities and incorporates the lessons learned in refining and improving their effectiveness.
The early June incidents caused some service interruptions, but Microsoft says no customer data was compromised. While the attackers disrupted services, they left customer data untouched, Microsoft said. “We have seen no evidence that customer data has been accessed or compromised,” the response read.

Microsoft Analyzes Cyberattacks That Disrupted Services

Microsoft Security Response Center (MSRC) has released a detailed analysis of the cyberattacks that crippled online services earlier this month. The response describes a series of Layer 7 distributed denial-of-service (DDoS) attacks launched by a threat actor Microsoft calls Storm-1359.

What Happened?

According to Microsoft, the Layer 7 DDoS attacks disrupted the company’s most popular services, including Azure, Outlook and OneDrive. A “Layer 7” attack is a form of DDoS that targets the application layer of the internet protocol suite. The attack vector uses a large number of requests to overwhelm the application layer and cause service interruptions or outages.
Microsoft has determined that Storm-1359 has access to a large collection of botnets and tools. This would allow the threat actor to launch DDoS attacks from multiple cloud services and open proxy infrastructures. Storm-1359 appears to be targeting disruption and publicity, MSRC said.
The DDoS attack first targeted the Outlook.com web portal on June 7. Next, the attackers moved to OneDrive on June 8, followed by the Microsoft Azure Portal on June 9. MSRC says Storm-1359’s attack methods include HTTP(S) flood attacks, cache bypass and Slowloris, each designed to flood a web service’s available connections, preventing it from serving new requests.

Preventing Future Disruptions

Microsoft launched a detailed investigation and took steps to mitigate or prevent future attacks.
“This recent DDoS activity has targeted layer 7 rather than layer 3 or 4,” explains MSRC. Microsoft says it has “strengthened” layer 7 protections, including tuning Azure Web Application Firewall (WAF) to better protect customers against the impact of similar DDoS attacks. While these tools and techniques are highly effective in mitigating the majority of disruptions, Microsoft consistently assesses the performance of its hardening capabilities and incorporates the lessons learned in refining and improving their effectiveness.
The early June incidents caused some service interruptions, but Microsoft says no customer data was compromised. While the attackers disrupted services, they left customer data untouched, Microsoft said. “We have seen no evidence that customer data has been accessed or compromised,” the response read.
Microsoft’s response to the cyberattacks is a testament to the company’s commitment to protecting its customers’ data and ensuring the security of its services. Microsoft has implemented a number of measures to protect against future DDoS attacks, including strengthening layer 7 protections, tuning Azure Web Application Firewall (WAF), and assessing the performance of its hardening capabilities.
These measures have been effective in mitigating the majority of disruptions, and Microsoft is continuously working to refine and improve their effectiveness. Microsoft has also seen no evidence that customer data has been accessed or compromised during the attacks.
Microsoft’s response to the cyberattacks is a reminder that companies must remain vigilant in protecting their data and services. Companies should consider implementing measures such as strengthening layer 7 protections, tuning Azure Web Application Firewall (WAF), and assessing the performance of their hardening capabilities to protect against future DDoS attacks. Additionally, companies should regularly assess their security posture to ensure their data remains secure.

Weekly Updates For Our Loyal Readers!

Security Parrot Editorial Team June 19, 2023
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?